{"id":27621,"date":"2025-06-25T07:13:11","date_gmt":"2025-06-25T11:13:11","guid":{"rendered":"https:\/\/www.h2kinfosys.com\/blog\/?p=27621"},"modified":"2025-06-25T07:26:26","modified_gmt":"2025-06-25T11:26:26","slug":"aws-devsecops-tools-for-ci-cd-a-practical-guide","status":"publish","type":"post","link":"https:\/\/www.h2kinfosys.com\/blog\/aws-devsecops-tools-for-ci-cd-a-practical-guide\/","title":{"rendered":"AWS DevSecOps Tools for CI\/CD: A Practical Guide"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Introduction: Why AWS DevSecOps Tools Matter Today<\/h2>\n\n\n\n<p>Modern software development thrives on automation, speed, and security. Continuous Integration and Continuous Deployment (CI\/CD) pipelines have become the backbone of agile development. However, without embedding security from the beginning, these pipelines can expose critical vulnerabilities. That&#8217;s where AWS DevSecOps Tools come in.<\/p>\n\n\n\n<p>By integrating security into the DevOps lifecycle using AWS-native tools, teams can ensure faster deployments without compromising on safety. This blog explores the top AWS DevSecOps Tools used in real-world CI\/CD pipelines, how they align with the Certified DevSecOps Professional CDP exam, and why enrolling in a <a href=\"https:\/\/www.h2kinfosys.com\/courses\/aws-devops-devsecops-training-program\/\">DevSecOps Training Course<\/a> is crucial for aspiring professionals.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is DevSecOps?<\/h2>\n\n\n\n<p>DevSecOps stands for Development, Security, and Operations. It is an approach that integrates security practices into the Learn AWS DevSecOps Tools for CI\/CD pipelines. Master real-world practices, prepare for the Certified DevSecOps Professional CDP exam, and boost your skills. <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/www.h2kinfosys.com\/courses\/aws-devops-devsecops-training-program\/\"><img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/www.h2kinfosys.com\/blog\/wp-content\/uploads\/2025\/06\/Dev.jpg\" alt=\"AWS DevSecOps Tools\" class=\"wp-image-27640\" title=\"\" srcset=\"https:\/\/www.h2kinfosys.com\/blog\/wp-content\/uploads\/2025\/06\/Dev.jpg 600w, https:\/\/www.h2kinfosys.com\/blog\/wp-content\/uploads\/2025\/06\/Dev-300x200.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p>DevOps pipeline. Instead of treating security as an afterthought, DevSecOps embeds it at every stage of the software development lifecycle (SDLC).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Core Principles of DevSecOps:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Shift Left Security<\/strong>: Catch vulnerabilities early in development.<\/li>\n\n\n\n<li><strong>Automation<\/strong>: Use automated tools for security testing.<\/li>\n\n\n\n<li><strong>Collaboration<\/strong>: Encourage communication between developers, security, and operations.<\/li>\n\n\n\n<li><strong>Continuous Monitoring<\/strong>: Maintain visibility and control through real-time alerts and reports.<\/li>\n<\/ul>\n\n\n\n<p>DevSecOps is more than a buzzword. It&#8217;s a cultural transformation. Security is no longer a siloed department but a shared responsibility. When organizations adopt DevSecOps effectively, they witness improved release cycles, reduced breach risks, and enhanced software quality.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why Choose AWS for DevSecOps?<\/h2>\n\n\n\n<p>Amazon Web Services (AWS) offers a comprehensive ecosystem for building secure and scalable CI\/CD pipelines. With a combination of managed services and deep integration, AWS simplifies DevSecOps implementation.<\/p>\n\n\n\n<p><strong>Benefits of AWS DevSecOps Tools:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Seamless integration with other AWS services<\/li>\n\n\n\n<li>High scalability and reliability<\/li>\n\n\n\n<li>Built-in compliance features (PCI-DSS, HIPAA, SOC2, etc.)<\/li>\n\n\n\n<li>Detailed logging and monitoring options<\/li>\n\n\n\n<li>Ecosystem of tools that work together in a unified interface<\/li>\n\n\n\n<li>Automation-friendly architecture for Infrastructure as Code (IaC)<\/li>\n<\/ul>\n\n\n\n<p>In addition to the tools themselves, AWS provides extensive documentation, tutorials, and cloud-native architecture support, making it the platform of choice for many DevSecOps engineers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Key AWS DevSecOps Tools for CI\/CD Pipelines<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/www.h2kinfosys.com\/courses\/aws-devops-devsecops-training-program\/\"><img decoding=\"async\" width=\"1024\" height=\"624\" src=\"https:\/\/www.h2kinfosys.com\/blog\/wp-content\/uploads\/2025\/06\/a0b8d8d4-9014-4632-8648-c0522f5fca39-1024x624.jpg\" alt=\"\" class=\"wp-image-27648\" style=\"width:663px;height:auto\" title=\"\" srcset=\"https:\/\/www.h2kinfosys.com\/blog\/wp-content\/uploads\/2025\/06\/a0b8d8d4-9014-4632-8648-c0522f5fca39-1024x624.jpg 1024w, https:\/\/www.h2kinfosys.com\/blog\/wp-content\/uploads\/2025\/06\/a0b8d8d4-9014-4632-8648-c0522f5fca39-300x183.jpg 300w, https:\/\/www.h2kinfosys.com\/blog\/wp-content\/uploads\/2025\/06\/a0b8d8d4-9014-4632-8648-c0522f5fca39-768x468.jpg 768w, https:\/\/www.h2kinfosys.com\/blog\/wp-content\/uploads\/2025\/06\/a0b8d8d4-9014-4632-8648-c0522f5fca39-1536x937.jpg 1536w, https:\/\/www.h2kinfosys.com\/blog\/wp-content\/uploads\/2025\/06\/a0b8d8d4-9014-4632-8648-c0522f5fca39-2048x1249.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\">1. AWS CodePipeline<\/h3>\n\n\n\n<p><strong>Purpose<\/strong>: Orchestration of CI\/CD stages.<\/p>\n\n\n\n<p>CodePipeline helps automate build, test, and deploy phases. You can integrate it with tools like Jenkins, GitHub, and AWS CodeBuild.<\/p>\n\n\n\n<p><strong>DevSecOps Usage<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Add security scans during build\/test stages<\/li>\n\n\n\n<li>Automate deployment approvals based on security policies<\/li>\n\n\n\n<li>Integrate IAM roles to enforce access control across pipeline stages<\/li>\n\n\n\n<li>Create conditional stages based on security test results<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">2. AWS CodeBuild<\/h3>\n\n\n\n<p><strong>Purpose<\/strong>: Compiles source code, runs tests, and produces <a href=\"https:\/\/en.wikipedia.org\/wiki\/Artifact\" rel=\"nofollow noopener\" target=\"_blank\">artifacts<\/a>.<\/p>\n\n\n\n<p><strong>DevSecOps Usage<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Embed security checks with tools like SonarQube or Snyk<\/li>\n\n\n\n<li>Use custom buildspec files to trigger vulnerability scans<\/li>\n\n\n\n<li>Connect with Secrets Manager to inject credentials securely<\/li>\n\n\n\n<li>Run static code analysis and license verification tools<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>version: 0.2\nphases:\n  build:\n    commands:\n      - snyk test\n      - bandit -r .<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">3. AWS CodeDeploy<\/h3>\n\n\n\n<p><strong>Purpose<\/strong>: Automates application deployments to EC2, Lambda, or on-prem servers.<\/p>\n\n\n\n<p><strong>DevSecOps Usage<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Configure rollback if security policies fail<\/li>\n\n\n\n<li>Automate post-deployment security validation<\/li>\n\n\n\n<li>Use CodeDeploy hooks for pre-deployment validation scripts<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">4. AWS CodeCommit<\/h3>\n\n\n\n<p><strong>Purpose<\/strong>: Secure, private Git repositories.<\/p>\n\n\n\n<p><strong>DevSecOps Usage<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use IAM policies to control access<\/li>\n\n\n\n<li>Set up pre-commit hooks for static code analysis<\/li>\n\n\n\n<li>Integrate code review policies that include security gatekeepers<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">5. AWS IAM (Identity and Access Management)<\/h3>\n\n\n\n<p><strong>Purpose<\/strong>: Manage access to AWS services and resources securely.<\/p>\n\n\n\n<p><strong>DevSecOps Usage<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enforce least privilege principle<\/li>\n\n\n\n<li>Audit access patterns using CloudTrail<\/li>\n\n\n\n<li>Enable MFA and role assumption policies for high-risk actions<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">6. AWS Secrets Manager<\/h3>\n\n\n\n<p><strong>Purpose<\/strong>: Securely stores, rotates, and retrieves secrets.<\/p>\n\n\n\n<p><strong>DevSecOps Usage<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Integrate secrets into CodeBuild and CodeDeploy securely<\/li>\n\n\n\n<li>Eliminate hardcoded credentials from source code<\/li>\n\n\n\n<li>Schedule automatic rotation of sensitive credentials<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">7. Amazon GuardDuty<\/h3>\n\n\n\n<p><strong>Purpose<\/strong>: Threat detection and continuous monitoring.<\/p>\n\n\n\n<p><strong>DevSecOps Usage<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identify malicious activity in real time<\/li>\n\n\n\n<li>Automate alerts into Slack, Jira, or Lambda actions<\/li>\n\n\n\n<li>Integrate with AWS Security Hub for unified threat intelligence<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">8. AWS Security Hub<\/h3>\n\n\n\n<p><strong>Purpose<\/strong>: Centralizes security findings across services.<\/p>\n\n\n\n<p><strong>DevSecOps Usage<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Consolidate vulnerability alerts<\/li>\n\n\n\n<li>Monitor compliance against industry standards<\/li>\n\n\n\n<li>Create security scorecards for executive visibility<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">9. Amazon Inspector<\/h3>\n\n\n\n<p><strong>Purpose<\/strong>: Automated vulnerability scanning of EC2 and container-based workloads.<\/p>\n\n\n\n<p><strong>DevSecOps Usage<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Schedule scans post-deployment<\/li>\n\n\n\n<li>Trigger pipeline failures on critical CVEs<\/li>\n\n\n\n<li>Generate compliance-ready reports for auditors<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">10. AWS CloudTrail &amp; CloudWatch<\/h3>\n\n\n\n<p><strong>Purpose<\/strong>: Logging and observability.<\/p>\n\n\n\n<p><strong>DevSecOps Usage<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Track user activities and API calls<\/li>\n\n\n\n<li>Build dashboards to monitor security posture<\/li>\n\n\n\n<li>Trigger alarms when unexpected behaviors are detected<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">How These Tools Support the Certified DevSecOps Professional CDP Exam<\/h2>\n\n\n\n<p>The <a href=\"https:\/\/www.h2kinfosys.com\/blog\/tag\/certified-devsecops-professional\/\" data-type=\"post_tag\" data-id=\"2029\">Certified DevSecOps Professional<\/a> CDP Exam focuses on:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Understanding secure SDLC practices<\/li>\n\n\n\n<li>Hands-on implementation using CI\/CD tools<\/li>\n\n\n\n<li>Cloud-native security tooling (especially on AWS)<\/li>\n<\/ul>\n\n\n\n<p><strong>AWS DevSecOps Tools<\/strong> form the backbone of the exam&#8217;s practical elements. For example:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>CodePipeline is central for building secure pipelines<\/li>\n\n\n\n<li>Inspector and GuardDuty are key for detection &amp; response<\/li>\n\n\n\n<li>IAM and Secrets Manager enforce secure configurations<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Real Certification Benefits:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Gain confidence in handling production-grade pipelines<\/li>\n\n\n\n<li>Validate your expertise with industry-recognized credentials<\/li>\n\n\n\n<li>Increase employability for roles like DevSecOps Engineer, Security Automation Analyst, or Cloud Architect<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Practical DevSecOps Pipeline with AWS Tools: A Step-by-Step Tutorial<\/h2>\n\n\n\n<p>Let\u2019s walk through building a secure CI\/CD pipeline using AWS DevSecOps Tools.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Step 1: Source Code Management with CodeCommit<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Create a secure repository with IAM-based access.<\/li>\n\n\n\n<li>Enable CloudTrail for audit logging.<\/li>\n\n\n\n<li>Define branch policies to enforce secure commits.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Step 2: Build Phase with CodeBuild<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Integrate Snyk and Bandit for static analysis.<\/li>\n\n\n\n<li>Inject secrets from Secrets Manager.<\/li>\n\n\n\n<li>Store build artifacts securely in S3.<\/li>\n\n\n\n<li>Run container image scans if using Docker.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Step 3: Security Validation<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Run Amazon Inspector scans.<\/li>\n\n\n\n<li>Use GuardDuty to detect threats.<\/li>\n\n\n\n<li>Report findings into Security Hub.<\/li>\n\n\n\n<li>Create remediation playbooks using Lambda functions.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Step 4: Deployment via CodeDeploy<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enforce canary deployments.<\/li>\n\n\n\n<li>Use IAM policies to secure deployment roles.<\/li>\n\n\n\n<li>Validate deployment using runtime tests.<\/li>\n\n\n\n<li>Trigger rollback if tests fail or threats are detected.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Step 5: Continuous Monitoring<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use CloudWatch Dashboards to monitor performance.<\/li>\n\n\n\n<li>Trigger Lambda-based alerts from GuardDuty.<\/li>\n\n\n\n<li>Aggregate logs for forensic analysis using Amazon S3 + Athena.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Diagram of the Pipeline:<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;CodeCommit] \u2192 &#91;CodeBuild w\/ Snyk + Bandit] \u2192 &#91;Amazon Inspector Scan] \u2192 &#91;CodeDeploy] \u2192 &#91;GuardDuty + CloudWatch Alerts]<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">Best Practices for Using AWS DevSecOps Tools<\/h2>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>Automate Security Testing<\/strong>: Use CodeBuild to run SAST and DAST tools on every commit.<\/li>\n\n\n\n<li><strong>Centralize Alerts<\/strong>: Route findings from Inspector and GuardDuty into Security Hub.<\/li>\n\n\n\n<li><strong>Secure Secrets<\/strong>: Avoid storing credentials in code. Use Secrets Manager.<\/li>\n\n\n\n<li><strong>Audit Everything<\/strong>: Enable CloudTrail and configure alerts via CloudWatch.<\/li>\n\n\n\n<li><strong>Fail Fast<\/strong>: Block deployments when vulnerabilities are found.<\/li>\n\n\n\n<li><strong>Version Control Configurations<\/strong>: Store IaC templates in Git.<\/li>\n\n\n\n<li><strong>Document Pipelines<\/strong>: Use diagrams and README files to explain every pipeline stage.<\/li>\n\n\n\n<li><strong>Review Access Policies Regularly<\/strong>: Update IAM roles as the team changes.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Real-World Example: Securing a Node.js App on AWS<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Scenario:<\/h3>\n\n\n\n<p>A team is deploying a Node.js app using CodePipeline, CodeBuild, and CodeDeploy.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Solution Using AWS DevSecOps Tools:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>CodeBuild<\/strong> runs ESLint, Snyk, and unit tests.<\/li>\n\n\n\n<li><strong>Secrets Manager<\/strong> injects API keys securely.<\/li>\n\n\n\n<li><strong>Inspector<\/strong> scans EC2 for OS-level vulnerabilities.<\/li>\n\n\n\n<li><strong>GuardDuty<\/strong> flags unusual SSH attempts.<\/li>\n\n\n\n<li><strong>Security Hub<\/strong> aggregates all security insights.<\/li>\n<\/ul>\n\n\n\n<p><strong>Outcome<\/strong>: The team reduces deployment time by 30% while improving security incident response. As a result, the company passed its security audit two weeks ahead of schedule.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How DevSecOps Training Courses Help<\/h2>\n\n\n\n<p>A structured DevSecOps Training Course not only teaches these tools but also enables:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Real-world pipeline creation<\/li>\n\n\n\n<li>Hands-on labs with AWS DevSecOps Tools<\/li>\n\n\n\n<li>Preparation for Top DevSecOps Certification exams<\/li>\n<\/ul>\n\n\n\n<p>These courses are essential for roles like DevSecOps Engineer, Cloud Security Architect, and CI\/CD Specialist.<\/p>\n\n\n\n<p>By practicing with guided exercises and solving real problems, students not only prepare for certification but also gain the confidence to architect, implement, and secure production pipelines.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Integrating AWS DevSecOps Tools into your CI\/CD workflow is no longer optional it&#8217;s essential. They enable faster releases, reduce risks, and ensure compliance. From CodeBuild and CodePipeline to Inspector and GuardDuty, these tools form a powerful ecosystem for secure automation.<\/p>\n\n\n\n<p>Start your journey today with hands-on DevSecOps skills. Enroll in H2KInfosys&#8217; DevSecOps Training Course and unlock the full potential of AWS DevSecOps Tools for your career.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Key Takeaways<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>DevSecOps integrates security into every stage of the SDLC.<\/li>\n\n\n\n<li>AWS provides powerful tools to automate secure CI\/CD pipelines.<\/li>\n\n\n\n<li>Tools like CodeBuild, Inspector, and GuardDuty enhance security posture.<\/li>\n\n\n\n<li>Training with AWS DevSecOps Tools prepares you for the CDP exam.<\/li>\n\n\n\n<li>Hands-on learning with a DevSecOps Training Course is essential for real-world success.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Introduction: Why AWS DevSecOps Tools Matter Today Modern software development thrives on automation, speed, and security. Continuous Integration and Continuous Deployment (CI\/CD) pipelines have become the backbone of agile development. However, without embedding security from the beginning, these pipelines can expose critical vulnerabilities. That&#8217;s where AWS DevSecOps Tools come in. By integrating security into the [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":27642,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2025],"tags":[],"class_list":["post-27621","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-devsecops-tutorials"],"_links":{"self":[{"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/posts\/27621","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/comments?post=27621"}],"version-history":[{"count":0,"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/posts\/27621\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/media\/27642"}],"wp:attachment":[{"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/media?parent=27621"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/categories?post=27621"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/tags?post=27621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}